log in
Submit an Article | Back

Member Articles

Technology - all

 

Sort By Title  |  Sort By Date

"Blockchain Technology and Applications for Healthcare" Kristen Johns on the Nashville Medical News blog
Waller, January 2017

The underlying technology behind the digital currency, Bitcoin, is piquing interest across Nashville’s healthcare industry, largely due to its potential to change the way data is shared. Blockchain, or distributed ledger technology, is a decentralized database that securely records transactions and can also allow for the transfer of an asset such as data or currency.https://nashvillemedicalnews...

"How to Transform International Registrations Under the Madrid Protocol" By Robert P Felber Jr INTA Bulletin
Waller, May 2018

The Madrid system for the International Registration of trademarks is a convenient and economical system for applicants in member countries to secure trademark registrations in other member countries throughout the world. There are 98 contracting parties to the Madrid Protocol, covering 114 countries, including the United Kingdom, the United States, Mexico, China, and much of Europe and the Pacific Rim (http://www.wipo.int/madrid/en/)...

"Night of the Living Trademark Zombie Trademarks in the United States" by Robert P Felber Jr and Julian L Bibb IV INTA Bulletin
Waller, October 2016

The February 2016 resolution of the five-year-old trademark dispute between Macy’s Inc. and Strategic Marks, LLC in the United States District Court for the Northern District of California (Macy’s Inc. et al. v. Strategic Marks, LLC, Case No. 15-0612, N.D. Cal. 2016) is a reminder that zombie trademarks still walk among us...

"Provisional Patent Applications A Cost-Effective Approach for Protecting Innovation" by Nate Bailey TICUAWaller Legal Notes
Waller, October 2016

Institutions of Higher Education serve a key role in fostering new ideas and spurring innovation. Recognizing the value of such innovation, the Bayh-Dole Act of 1980 permits universities to own patents directed to the technologies they develop. While some large research institutions pursue patents to protect their inventions, many colleges and universities forego patent protection based on the perception that patent applications are cost-prohibitive. http://www.ticua...

"Right to be Forgotten" - Search Engine Operators Must Comply with Requests to Delete Links to Personal Data
Heuking Kühn Lüer Wojtek, January 2019

The use of the Internet without the use of search engines, which list links to Internet pages after keywords have been entered, is almost unthinkable. In the context of the search results, however, websites may appear that contain personal data and thus fall within the scope of the GDPR...

"TTAB Highlights Importance of Filing Cancelation Petitions on Tim" by Julian L Bibb IV INTA Bulletin
Waller, September 2016

In a precedential decision (June 7, 2016), the U.S. Trademark Trial and Appeal Board (Board) held that when a petitioner files a petition to cancel an existing registration when the registration is less than five years old, the five-year bar in the Lanham Act Section 14 (15 U.S.C. Section 1064) is tolled for the purpose of adding an additional claim against that registration.Ashland Licensing & Intellectual Property LLC v. Sunpoint International Group USA Corp...

"Watering Down the Risk of Data Breaches" by Steve Blumenthal Nashville Business Journal
Waller, October 2016

I’ve had bad experiences with water. Pouring out of broken washers and gushing from burst pipes, water has repeatedly defied my attempts to keep it contained. But I need water, so I maintain my plumbing, use water sensibly, and, if I suffer a leak, I clean up the mess and go on. Why am I talking about water? Modern businesses need data, like we need water...

...And Then There Was One: The Outlook for a Self-Regulatory United States
Haynes and Boone, LLP, December 2005

Germany. November 9, 1938. Kristallnacht. “The Night of Broken Glass.” Nazi secret police and the Hitler youth swarm over Jewish businesses and homes, terrorizing and victimizing helpless individuals all over the country.1 SS leadership orchestrates attacks on every vestige of Jewish culture as “punishment” for fictitious crimes that will never be recognized by the rest of the world...

.XXX Domain Registry Begins Accepting Opt-Out Applications
Haynes and Boone, LLP, September 2011

Beginning today, September 7, 2011, owners of registered trademarks can file applications to block third parties from registering adult-oriented .XXX domains that contain their marks. This “Sunrise” period runs through October 28, 2011. Opt-out applications can be submitted using any .XXX accredited registrar. The current list of accredited registrars is available here. Registars’ fees vary but typically range from $200 to $500 per mark...

.XXX Marks the Spot? Trademark Owners Can Block the Use of Their Marks in .XXX Domains
Haynes and Boone, LLP, June 2011

First proposed more than a decade ago, .XXX top-level domains have now been approved and will be launching shortly. The domains are intended for use by the adult entertainment industry, but for trademark owners in other industries, the potential association of their valuable brands with .XXX domains could have serious consequences. Fortunately, owners of registered trademarks can soon apply to block third parties from registering .XXX domains that contain their marks. The ...

“Seismic Shifts in Digital Technology:” Supreme Court Creates Exception to Third-Party Doctrine for Cell-Site Location Information
Dykema, June 2018

After not disturbing the Third-Party Doctrine for more than 40 years, the Supreme Court created a significant exception to it inCarpenter v. United States. Slip Op., 16-402 (Jun. 22, 2018). Under the Third-Party Doctrine, individuals who voluntarily provide personal information to third parties are deemed to relinquish their legitimate reasonable expectation of privacy in that information...

3D Printers – A Host Of Possibilities But Not Entirely Without Problems
Delphi, June 2014

The technology to “print” three dimensional objects with a 3D printer is not new, but as prices for the technology fall it becomes more readily available for private individuals. The possibilities that open up when individuals get access to 3D printers trigger the imagination, but the accompanying issues are not without complications. The technology, and the new areas of use to which it is put, also raises many questions, particularly regarding intellectual property rights...

3D Printing
ENSafrica, March 2013

The BBC recently published a piece called ‘3D Printing Will Be the Next Big Copyright Fight’. It said this:  ‘That moment we’ve been hearing about for years – the one where futuristic-sounding 3D printing becomes ubiquitous – is actually upon us.’  It dealt with a topic that’s also referred to as ‘additive manufacturing’...

4 Key Legal Considerations to Help Directors Manage Cyber Risks
Fredrikson & Byron, P.A., September 2015

In a highly anticipated opinion issued last week, the United States Court of Appeals for the Third Circuit held that the Federal Trade Commission (FTC) has authority under Section 5 of the FTC Act to regulate cybersecurity. The opinion is the latest development in a legal drama that began after Wyndham Worldwide Corp. (Wyndham) suffered three data breaches between 2008 and 2009...

A Few Legal Comments on Spamdexing
ALTIUS/Tiberghien, February 2009

What is spamdexing? The Internet contains a lot of information. In 2002, the total number of web pages was estimated at 2.024 million; by 2005 this estimate had risen to 11.5 billion2. The ever- increasing amount of information found on the Internet also has disadvantages. In this jungle of information, it is getting harder and harder to see the wood for the trees...

A Legal Obligation to Monitor your Social Media Pages?
ENSafrica, September 2017

Many of us are aware of the popular myth that ostriches believe burying their heads in the sand will make them invisible to predators. In other words, an “if I can’t see you, you can’t see me” approach. Even though scientists will tell you that this is not true, the approach seems to bear a resemblance to the online behaviour of some humans...

A New Connectivity: Revised Electronic Communications Code is Launched
Shoosmiths LLP, July 2017

  The Digital Economy Act 2017 introduces a new electronic communications code, intended to facilitate widespread connectivity and address some of the critical issues that currently beset the telecoms industry. The current electronic communications code was issued in 1984 and it was designed to facilitate the installation and maintenance of fixed line communications networks...

A Tweet that Wasn't so Sweet – Court Orders $105,000 in Damages for Defamatory Tweets and Facebook Posts
MinterEllison, March 2014

In a landmark case in Australia that is a first of its kind (but undoubtedly will not be the last), damages have been awarded to New South Wales school teacher, Mrs Christine Mickle, for offensive and defamatory tweets and Facebook posts made by an ex-student of the school where she taught.  The student, Andrew Farley, apparently held a grudge against Mrs Mickle for playing what he perceived as a role in the removal of his father from the position of head music teacher at the school...

Abuse of Dominance: Important Clarifications by the European Court of Justice
Simonsen Vogt Wiig AS, September 2017

The European Court of Justice makes important clarifications relevant for dominant firms'' pricing and rebate policies in its recent Intel-judgment Introduction In recent months, the European Court of Justice (''ECJ'') delivered its long awaited judgment in the Intel appeal case. The judgment sets aside the ruling by the General Court and refers the matter back to that court...

Access to Content Suffices: Online Copyright Infringers Can be sued home and away
Krogerus, March 2015

When copyright has been infringed online, what court is competent to hear and decide the case? The EU top court’s recent ruling provides clarity and states that online infringement cases can be heard where the infringing content is accessible. The content right holders will be able to take legal action against the infringer in their home countries, but only regarding damage that occurred there...

ADGM Announces Tech Start-Up Licensing Regime
Afridi & Angell, October 2018

The Abu Dhabi Global Market (the ADGM) recently announced the launch of a commercial license specifically catered towards tech start-ups that allows entrepreneurs to obtain an operational license in the ADGM and access to a Professional Services Support Program aimed at allowing entrepreneurs entry to a community of businesses, financial services and professional advisors...

Agreement on The New EU Cybersecurity Act
Heuking Kühn Lüer Wojtek, December 2018

I. Introduction According to a Bitkom study from September 2018, German industry has incurred a total loss of 43 billion euros as a result of cyberattacks over the past two years. Seven out of ten industrial companies have been victims of such attacks during this period. At EU level, there has recently been a growing discussion on how to face this mounting danger...

All Stop: Ruling on the Applicability of Exclusion to BIPA Claims Delayed
Dykema, March 2019

The fallout from the Illinois Supreme Court’s January 25, 2019, opinion in Rosenbach v. Six Flags Entertainment Corp., 19 IL 12316, continues.Rosenbach settled the dispute of who qualifies as an “aggrieved person” under the Illinois Biometric Information Privacy Act (“BIPA”), and in doing so opened the floodgates for this litigation to proliferate...

Amendment to the Brown Act Provides for New Website and Agenda Requirements
Hanson Bridgett LLP, July 2017

On January 1, 2019, local agencies will be required to comply with new requirements for posting agendas on their websites (AB 2257). The California Brown Act requires that any local agency must post an agenda 72 hours in advance of a regular meeting. If an agency has a website, then the agency is required to post the agenda on their website...

Amendments to the Copyright Act 1987
Shearn Delamore & Co., April 2016

The Copy Right Act 1987 provides a framework for the protection of copy right and enforcement through civil redress, as well as outlines the powers granted to state authorities for the enforcement of copy right and prosecution of copy right offences. The Copy Right Amendment Act 2012 (“2012 Amendment Act”) came into operation on 1st March 2012. The following is a summary of some of the amendmentspursuant to the 2012 Amendment Act...

 

 

WSG's members are independent firms and are not affiliated in the joint practice of professional services. Each member exercises its own individual judgments on all client matters.

HOME | SITE MAP | GLANCE | PRIVACY POLICY | DISCLAIMER |  © World Services Group, 2019